IET Biometrics最新文献

筛选
英文 中文
A biometric-based verification system for handwritten image-based signatures using audio to image matching 一种基于生物特征的验证系统,用于使用音频到图像匹配的手写图像签名
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-16 DOI: 10.1049/bme2.12059
Abdulaziz Almehmadi
{"title":"A biometric-based verification system for handwritten image-based signatures using audio to image matching","authors":"Abdulaziz Almehmadi","doi":"10.1049/bme2.12059","DOIUrl":"10.1049/bme2.12059","url":null,"abstract":"<p>Signing a document or a cheque by hand or using a stored image-based signature is known to be a valid method for authentication and authorisation by the signer. However, signature forging has advanced to replicate exactly how a signature looks, which can be done by skilfully, unskilfully or randomly forging a signature. Such a dilemma presents a challenge to accurately authenticate and authorise using signatures. In this study, a verification system is proposed for handwritten image-based signatures for validating whether the image-based signature is authentic rather than forged. The system maps the live stream of an audio-based signature with the investigated image-based signature and returns the match results. Matching is done by classification and/or by correlation between the two signatures. If matching shows a similar class or a score above a pre-defined threshold, the image-based signature is verified to be authentic, otherwise it is flagged as forged. A total of 20 participated in the experiment, where each participant provided a legitimate signature and forged four other signatures in different settings. In a double-blind setting, the system reported 95% accuracy using a one-class SVM and 100% accuracy using a correlation coefficient for detecting forged versus legitimate signatures.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"124-140"},"PeriodicalIF":2.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90829446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics 欧洲生物识别协会对欧洲数据保护监管机构“生物识别技术中的误解”的回应
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-11 DOI: 10.1049/bme2.12057
Christoph Busch, Adam Czajka, Farzin Deravi, Pawel Drozdowski, Marta Gomez-Barrero, Georg Hasse, Olaf Henniger, Els Kindt, Jascha Kolberg, Alexander Nouak, Kiran Raja, Raghavendra Ramachandra, Christian Rathgeb, Jean Salomon, Raymond Veldhuis
{"title":"A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics","authors":"Christoph Busch,&nbsp;Adam Czajka,&nbsp;Farzin Deravi,&nbsp;Pawel Drozdowski,&nbsp;Marta Gomez-Barrero,&nbsp;Georg Hasse,&nbsp;Olaf Henniger,&nbsp;Els Kindt,&nbsp;Jascha Kolberg,&nbsp;Alexander Nouak,&nbsp;Kiran Raja,&nbsp;Raghavendra Ramachandra,&nbsp;Christian Rathgeb,&nbsp;Jean Salomon,&nbsp;Raymond Veldhuis","doi":"10.1049/bme2.12057","DOIUrl":"10.1049/bme2.12057","url":null,"abstract":"<p>The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification and Authentication’ that was published in June 2020 and to provide additional input to help with the better understanding of the issues raised in that publication. In particular, it aims to highlight some important missing information in the aforementioned publication. It is hoped that this paper will help with any future revision of the EDPS-aepd publication, such that it includes a full picture of the current state of the art in biometrics and the availability of standards and privacy enhancing techniques.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"79-86"},"PeriodicalIF":2.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73818655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securable networked scheme with face authentication 具有人脸认证的安全网络方案
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-09 DOI: 10.1049/bme2.12056
Da-You Huang, Chun-Liang Lin, Yang-Yi Chen
{"title":"Securable networked scheme with face authentication","authors":"Da-You Huang,&nbsp;Chun-Liang Lin,&nbsp;Yang-Yi Chen","doi":"10.1049/bme2.12056","DOIUrl":"10.1049/bme2.12056","url":null,"abstract":"<p>Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"97-108"},"PeriodicalIF":2.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 客座编辑:BIOSIG 2020个人认证可信度特刊
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-02 DOI: 10.1049/bme2.12055
Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"&lt;p&gt;Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.&lt;/p&gt;&lt;p&gt;This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.&lt;/p&gt;&lt;p&gt;The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.&lt;/p&gt;&lt;p&gt;The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.&lt;/p&gt;&lt;p&gt;The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promi","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72126370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication 嘉宾评论:2020年BIOSIG关于个人认证可信度的特刊
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-09-01 DOI: 10.1049/bme2.12055
Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia
{"title":"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication","authors":"Ana F. Sequeira, M. Gomez-Barrero, Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":"https://doi.org/10.1049/bme2.12055","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"41 1","pages":"457-459"},"PeriodicalIF":2.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76649373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EEG personal recognition based on ‘qualified majority’ over signal patches 基于“限定多数”的脑电信号个人识别
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-08-19 DOI: 10.1049/bme2.12050
Andrea Panzino, Giulia Orrù, Gian Luca Marcialis, Fabio Roli
{"title":"EEG personal recognition based on ‘qualified majority’ over signal patches","authors":"Andrea Panzino,&nbsp;Giulia Orrù,&nbsp;Gian Luca Marcialis,&nbsp;Fabio Roli","doi":"10.1049/bme2.12050","DOIUrl":"10.1049/bme2.12050","url":null,"abstract":"<p>Electroencephalography (EEG)-based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the duration of the signal length, called ‘epoch’, which must be very short for practical purposes and (2) the contribution of EEG sub-bands. These two aspects are connected because the shorter the epoch’s duration, the lower the contribution of the low-frequency sub-bands while enhancing the high-frequency sub-bands. However, it is well known that the former characterises the inner brain activity in resting or unconscious states. These sub-bands could be of no use in the wild, where the subject is conscious and not in the condition to put himself in a resting-state-like condition. Furthermore, the latter may concur much better in the process, characterising normal subject activity when awake. This study aims at clarifying the problems mentioned above by proposing a novel personal recognition architecture based on extremely short signal fragments called ‘patches’, subdividing each epoch. Patches are individually classified. A ‘qualified majority’ of classified patches allows taking the final decision. It is shown by experiments that this approach (1) can be adopted for practical purposes and (2) clarifies the sub-bands’ role in contexts still implemented in vitro but very similar to that conceivable in the wild.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 1","pages":"63-78"},"PeriodicalIF":2.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84293337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unknown presentation attack detection against rational attackers 针对理性攻击者的未知演示攻击检测
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-08-06 DOI: 10.1049/bme2.12053
Ali Khodabakhsh, Zahid Akhtar
{"title":"Unknown presentation attack detection against rational attackers","authors":"Ali Khodabakhsh,&nbsp;Zahid Akhtar","doi":"10.1049/bme2.12053","DOIUrl":"https://doi.org/10.1049/bme2.12053","url":null,"abstract":"<p>Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real-life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial settings, few-shot learning, and explainability. In this study, these limitations are approached by reliance on a game-theoretic view for modelling the interactions between the attacker and the detector. Consequently, a new optimisation criterion is proposed and a set of requirements are defined for improving the performance of these systems in real-life settings. Furthermore, a novel detection technique is proposed using generator-based feature sets that are not biased towards any specific attack species. To further optimise the performance on known attacks, a new loss function coined categorical margin maximisation loss (C-marmax) is proposed, which gradually improves the performance against the most powerful attack. The proposed approach provides a more balanced performance across known and unknown attacks and achieves state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach as well as its ability to provide pixel-level explainability is studied.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"460-479"},"PeriodicalIF":2.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72141048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Failure of affine-based reconstruction attack in regenerating vascular feature points 基于仿射的重建攻击在血管特征点重建中的失败
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-07-28 DOI: 10.1049/bme2.12048
Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam
{"title":"Failure of affine-based reconstruction attack in regenerating vascular feature points","authors":"Mahshid Sadeghpour,&nbsp;Arathi Arakala,&nbsp;Stephen A. Davis,&nbsp;Kathy J. Horadam","doi":"10.1049/bme2.12048","DOIUrl":"https://doi.org/10.1049/bme2.12048","url":null,"abstract":"<p>Inverse biometrics methods are a major privacy concern for users of biometric recognition systems. Affine-based reconstruction attack is an inverse biometrics method that models the biometric recognition algorithm by an affine approximation. This type of attack reconstructs targeted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Although this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack since this method is sufficiently general to be applied to other biometric templates. Here it is shown that the attack fails to regenerate sparse vascular feature point templates. The reconstruction attack on feature point patterns extracted from retina and hand vascular images is tested. The inverse attack match rate for reconstructed reference templates was 0.3% in one experiment using retinal vasculature and 0% for all others. These results show that the reconstruction attack is not as catastrophic as it is widely accepted to be, and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"497-517"},"PeriodicalIF":2.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72167372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The following article for this Special Issue was published in a different issue 本期特刊的以下文章发表在另一期
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-07-27 DOI: 10.1049/bme2.12054
{"title":"The following article for this Special Issue was published in a different issue","authors":"","doi":"10.1049/bme2.12054","DOIUrl":"https://doi.org/10.1049/bme2.12054","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 4","pages":"456"},"PeriodicalIF":2.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72192157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN-based off-angle iris segmentation and recognition 基于CNN的离角虹膜分割与识别
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-07-13 DOI: 10.1049/bme2.12052
Ehsaneddin Jalilian, Mahmut Karakaya, Andreas Uhl
{"title":"CNN-based off-angle iris segmentation and recognition","authors":"Ehsaneddin Jalilian,&nbsp;Mahmut Karakaya,&nbsp;Andreas Uhl","doi":"10.1049/bme2.12052","DOIUrl":"https://doi.org/10.1049/bme2.12052","url":null,"abstract":"<p>Accurate segmentation and parameterisation of the iris in eye images still remain a significant challenge for achieving robust iris recognition, especially in off-angle images captured in less constrained environments. While deep learning techniques (i.e. segmentation-based convolutional neural networks (CNNs)) are increasingly being used to address this problem, there is a significant lack of information about the mechanism of the related distortions affecting the performance of these networks and no comprehensive recognition framework is dedicated, in particular, to off-angle iris recognition using such modules. In this work, the general effect of different gaze angles on ocular biometrics is discussed, and the findings are then related to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. An improvement scheme is also introduced to compensate for some segmentation degradations caused by the off-angle distortions, and a new gaze-angle estimation and parameterisation module is further proposed to estimate and re-project (correct) the off-angle iris images back to frontal view. Taking benefit of these, several approaches (pipelines) are formulated to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition. Within the framework of these approaches, a series of experiments is carried out to determine whether (i) improving the segmentation outputs and/or correcting the output iris images before or after the segmentation can compensate for some off-angle distortions, (ii) a CNN trained on frontal eye images is capable of detecting and extracting the learnt features on the corrected images, or (iii) the generalisation capability of the network can be improved by training it on iris images of different gaze angles. Finally, the recognition performance of the selected approach is compared against some state-of-the-art off-angle iris recognition algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"518-535"},"PeriodicalIF":2.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72151038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信